Architecture of consecutive identification of attack to information resources | IEEE Conference Publication | IEEE Xplore